Vulnerability Description
libpng 1.2.5 and earlier does not properly calculate certain buffer offsets, which could allow remote attackers to execute arbitrary code via a buffer overflow attack.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Greg Roelofs | Libpng3 | 1.2.0 |
References
- http://secunia.com/advisories/33137
- http://security.gentoo.org/glsa/glsa-200812-15.xml
- http://www.debian.org/security/2004/dsa-536PatchVendor Advisory
- https://bugzilla.fedora.us/show_bug.cgi?id=1943
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16914
- http://secunia.com/advisories/33137
- http://security.gentoo.org/glsa/glsa-200812-15.xml
- http://www.debian.org/security/2004/dsa-536PatchVendor Advisory
- https://bugzilla.fedora.us/show_bug.cgi?id=1943
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16914
FAQ
What is CVE-2004-0768?
CVE-2004-0768 is a vulnerability with a CVSS score of 7.5 (HIGH). libpng 1.2.5 and earlier does not properly calculate certain buffer offsets, which could allow remote attackers to execute arbitrary code via a buffer overflow attack.
How severe is CVE-2004-0768?
CVE-2004-0768 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-0768?
Check the references section above for vendor advisories and patch information. Affected products include: Greg Roelofs Libpng3.